期刊文献+

基于云的工业信息安全试验平台架构设计 被引量:2

Design of industrial information security test platform architecture based on cloud
下载PDF
导出
摘要 针对传统工业信息安全测试环境搭建复杂、实时性差、测试效率低的问题,提出了一种基于云平台的工业信息安全试验平台架构,详细阐述了平台设计方案,通过云计算技术、虚拟化技术、虚实互联技术、可视化技术和自动化测试技术,拥有了平台灵活定制测试环境、多类型测试流量、多任务并行和测试结果科学评估的能力。最后,平台应用了知识库管理,能够提高测试效率,缩短测试周期。 According to the question of traditional industrial information security testing environment which has built complex,poor real-time performance and low test efficiency,an industrial information security test platform architecture based on cloud platform is proposed. This article elaborated on the platform design. Through cloud computing technology,virtualization technology,virtual interconnected technology,visualization technology and automated testing technology,the platform has the ability to flexibly customize the test environment,multi-type test traffic,multi-task parallelism and scientific evaluation of test results. Finally,the platform uses knowledge base management to improve test efficiency and shorten test cycles.
作者 霍朝宾 贺敏超 刘思洋 Huo Chaobin;He Minchao;Liu Siyang(The 6th Research Institute of China Electronics Corporation,Beijing 102209,China)
出处 《信息技术与网络安全》 2018年第5期25-28,共4页 Information Technology and Network Security
关键词 云计算 虚拟化 虚实互联 可视化 自动化测试 Cloud computing virtualization virtual intemet visualization automated testing
  • 相关文献

参考文献5

二级参考文献27

  • 1沈昌祥.基于可信平台构筑积极防御的信息安全保障框架[J].信息安全与通信保密,2004,26(9):17-19. 被引量:16
  • 2张志红.智能卡安全技术及在PKI中的应用[J].网络安全技术与应用,2005(6):10-12. 被引量:8
  • 3邹敏清.基于USB智能卡的文件加密方法[J].科技广场,2006(7):30-32. 被引量:2
  • 4杨帆.USB KEY体系研究与技术实现[D]武汉大学,武汉大学2004.
  • 5Zhao Y,Liu JQ.An operating system trusted security model for important sensitive information system. the proceedings of IsDPE . 2007
  • 6Li MeiHong,Liu JiQiang.USB key-based approach for software Protection. . 2009
  • 7Young-SukShin.Virtual experiment environment’s design for science education. . 2004
  • 8Dawei Zhang.Network Security Middlewate Based on USB Key. . 2008
  • 9William T Polk.Public Key Infrastructures that Satisfy,Security Goals. IEEE Internet Computing . 2003
  • 10Thompson M R,Essiari A,Mudumbai S.Certificate-based authorization policy in a PKI environment. ACM Transactions on Information and System Security . 2003

共引文献24

同被引文献36

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部